lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <AANLkTinOJyWJh=LTsUBOoR+7OTheKzNCLPR2kGzdNAUz@mail.gmail.com>
Date: Mon, 7 Feb 2011 12:52:50 +0100
From: Daniël W. Crompton <daniel.crompton@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: encrypt the bash history

On 4 February 2011 20:06, Zerial. <fernando@...ial.org> wrote:

Hi,

what is the best way to encrypt the bash_history file?
> I try using crypt/decrypt with GPG when login/logout. It works, but not
> safe enough.


what I did for a project I was working on was I create a LD_PRELOAD library
which overloaded the i/o operations and used gz and bz2. This could easily
be adapted to overload with encryption library functions rather than
compression libraries. You can also use this to keep the bash history in
memory using a shared memory location.

As said in the rest of the thread this won't completely stop root, but it
does make it more difficult.

D.


blaze your trail

--
Daniël W. Crompton <daniel.crompton@...il.com>

<http://specialbrands.net/>

<http://specialbrands.net/>
http://specialbrands.net/
<http://twitter.com/webhat>
<http://www.facebook.com/webhat><http://plancast.com/webhat><http://www.linkedin.com/in/redhat>

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ